DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
Static task
static1
Behavioral task
behavioral1
Sample
0d90284837809b566a1c5cf6bb74c900.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d90284837809b566a1c5cf6bb74c900.dll
Resource
win10v2004-20231215-en
Target
0d90284837809b566a1c5cf6bb74c900
Size
127KB
MD5
0d90284837809b566a1c5cf6bb74c900
SHA1
1a6eea9cef052fff17d8c47929d7065e188d8d05
SHA256
da78bd5de215e20a18ea9edcf8872a0850c3dc8f76708e8383ad43a747bda35b
SHA512
d274b8db054c488618c33647c0f1c8db387bfee656a3b711888c66524e9368a5ee2720f9e497b6c8dbc91b34d41b440922e73c882b4e5d1f3e642e3a24dbcccc
SSDEEP
3072:QDb3SSU83GMC9V3Jf4qDZXwqsUOzVbzToz:Qv5WVV14qDZXwqsxZbAz
Checks for missing Authenticode signature.
resource |
---|
0d90284837809b566a1c5cf6bb74c900 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetExitCodeThread
CreateRemoteThread
VirtualAllocEx
lstrlenW
OpenProcess
MultiByteToWideChar
WideCharToMultiByte
SetLastError
TlsSetValue
TlsGetValue
SystemTimeToFileTime
GetSystemTime
lstrlenA
IsBadWritePtr
TlsAlloc
TlsFree
GetLastError
CreateMutexA
GetModuleFileNameW
lstrcpynA
GetVersionExA
VirtualFreeEx
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
LeaveCriticalSection
EnterCriticalSection
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
OpenMutexA
GetACP
IsDebuggerPresent
LoadLibraryW
GetProcessHeap
HeapAlloc
HeapFree
Process32First
DeleteCriticalSection
InitializeCriticalSection
FindCloseChangeNotification
GetSystemDirectoryA
GetWindowsDirectoryA
FindFirstChangeNotificationA
WaitForMultipleObjects
Sleep
CloseHandle
WaitForSingleObject
TerminateThread
CreateToolhelp32Snapshot
GetModuleFileNameA
CopyFileA
LoadLibraryExA
ReadProcessMemory
FreeLibrary
DeleteFileA
VirtualQuery
GetVersion
lstrcmpiA
VirtualProtect
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
GetProcAddress
LoadLibraryA
lstrcmpA
lstrcpyA
FindFirstFileA
FindClose
IsBadStringPtrA
WritePrivateProfileSectionA
WriteFile
MoveFileExA
GetTickCount
DeviceIoControl
GetPrivateProfileStructA
Process32Next
GetTempPathA
GetPrivateProfileIntA
CreateProcessA
InterlockedDecrement
WritePrivateProfileStructA
IsWindow
PostMessageA
DispatchMessageA
FindWindowExA
RegisterWindowMessageA
TranslateMessage
GetWindowThreadProcessId
GetMessageA
GetClassNameA
SetWindowsHookExA
EnumWindows
SendMessageA
GetParent
CallNextHookEx
UnhookWindowsHookEx
KillTimer
DestroyWindow
PostQuitMessage
SetTimer
GetClassInfoExA
RegisterClassExA
CreateWindowExA
SetWindowLongA
GetWindowLongA
DefWindowProcA
FindWindowA
GetStockObject
RegQueryValueExA
RegOpenKeyExA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
RegOpenKeyA
RegEnumKeyExA
RegCloseKey
RegEnumKeyA
RegEnumValueA
RegQueryValueExW
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegCreateKeyA
RegSetValueExA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
OpenServiceA
ControlService
QueryServiceStatus
StartServiceA
RegSetValueExW
RegOpenKeyExW
CoTaskMemFree
StringFromCLSID
SysFreeString
SysAllocString
PathFileExistsA
PathAppendA
PathFindExtensionA
PathRemoveBlanksA
PathRemoveBackslashA
PathRemoveFileSpecA
PathRemoveExtensionA
SHGetValueA
SHDeleteKeyA
SHDeleteValueA
SHSetValueA
PathFindFileNameA
StrStrIA
PathStripToRootA
ImageDirectoryEntryToData
realloc
memmove
_CxxThrowException
_mbsicmp
wcscpy
sprintf
_mbsnbicmp
_mbschr
rand
srand
time
_mbscmp
_mbsnbcpy
_snprintf
fclose
fwrite
fopen
sscanf
wcslen
_wcsicmp
_tempnam
fread
malloc
fseek
ftell
fputs
strstr
fgets
rewind
wcsstr
strrchr
strchr
_vsnprintf
atoi
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
tmpnam
_strnicmp
_stricmp
_itoa
_strlwr
_wcsset
_strnset
free
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ